Enabling Secure Digital Transformation: Strategies to Secure Your Project, Customers, and Organization

Congratulations. Your vision for the digital transformation (DX) of your organization is now an official project which is critical to the future of the business, and quite possibly your career. However, the vast number of moving parts; in a DX initiative presents new...

RedShield Named 2021 TAG Cyber Distinguished Vendor

RedShield, specialists in web application shielding, has been named as a ‘Distinguished Vendor’ in TAG Cyber’s 2021 Security Annual. Released on September 22, the accolade in the Security Annual makes RedShield part of an elite industry collective supporting the...

RedShield appoints Cybersecurity veteran Kate Kuehn as Board Director

RedShield, specialists in web application shielding, has announced the appointment of industry thought-leader Kate Kuehn as a board director. Based in Chicago, Kuehn’s appointment is part of RedShield’s strategy to accelerate growth in the U.S; a push made possible by...

How RedShield helps you manage vulnerabilities and comply with the California Consumer Privacy Act (CCPA), 2018

How RedShield helps you manage vulnerabilities and comply with the California Consumer Privacy Act (CCPA), 2018The California Consumer Privacy Act (CCPA) came into effect in January 2020, and as of 1 July 2020, enforcement has begun against businesses that violate the...

Urgent Action Needed to Protect E-Commerce Sites From E-Skimming Attacks Targeting Magento Vulnerabilities

Urgent Action Needed to Protect E-Commerce Sites From E-Skimming Attacks Targeting Magento VulnerabilitiesAs at 30 June 2020, Magento is no longer providing support for security software updates and security patches for its popular Commerce 1 and Open Source CMS...

Shielding the Remote Execution of Code on NetWeaver (RECON) Vulnerability

Shielding the Remote Execution of Code On NetWeaver (RECON) VulnerabilityOrganisations with unpatched SAP systems are currently at high risk for attacks exploiting the Remote Execution of Code On NetWeaver (RECON) Vulnerability.RedShield has developed custom shield...

Recent Australia Cyber Attacks | RedShield’s Unique Solution

Following recent warnings from the Australian Prime Minister about sophisticated cyber attacks being targeted at Australia by 'state actors', we wanted to share information on RedShield's unique capabilities as a solution to the current threats. The Australian Cyber...

RedShield appoints Senior Verizon Cyber Security VP as Chief Revenue Officer in U.S. Push

RedShield, specialists in web application shielding, has announced the appointment of global cyber security leader, James Carrigan Jr. as Chief Revenue Officer (CRO), responsible for sales globally.

Your AI WAF is leaving you 100% vulnerable…

Your AI WAF is leaving you 100% vulnerable...I love technology. I’m the biggest sucker for buying new gadgets with flashing lights. So, as you can imagine (and despite the obvious privacy concerns) I absolutely love my AI driven (well, somewhat AI driven) Google Home...

Cryptojacking – Browser cryptocurrency mining

Cryptojacking – Browser cryptocurrency miningI’m going to start by saying I really should have one of those T-shirts; “Yes I work in IT, but NO I won’t fix your computer”. I’m sure you can all relate to being at a family function until someone can’t help but ask “I’ve...

Our blog 

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.